A Kerberos security architecture for web services based instrumentation grids

  • Authors:
  • Athanasios Moralis;Vassiliki Pouli;Symeon Papavassiliou;Vasilis Maglaris

  • Affiliations:
  • Network Management & Optimal Design Laboratory (NETMODE), National Technical University of Athens (NTUA) Athens, Greece;Network Management & Optimal Design Laboratory (NETMODE), National Technical University of Athens (NTUA) Athens, Greece;Network Management & Optimal Design Laboratory (NETMODE), National Technical University of Athens (NTUA) Athens, Greece;Network Management & Optimal Design Laboratory (NETMODE), National Technical University of Athens (NTUA) Athens, Greece

  • Venue:
  • Future Generation Computer Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Instrumentation Grids aim at controlling and managing heterogeneous resources & instruments securely, reliably and in near real-time. Within this context, we present a Web Services based Security Architecture that aims at improving security performance maintaining at the same time interoperability with legacy Grid Security Infrastructure (GSI). Our architecture utilizes GSI X.509 Certificates or Proxy Certificates (RFC3820) for the initial authentication of a user. However, it subsequently maps this identity to a Kerberos one and utilizes WS Security Kerberos Token Profile for embedding user credentials within WS exchange mechanisms. It then provides user authorization, thus realizing a complete AAI (Authentication & Authorization Infrastructure). In order to demonstrate and quantify the performance improvement achieved by our approach over a message exchange using X.509 Certificate Token Profile, we present comparative measurements on implementations of the two options. Our results demonstrate that the Kerberos message exchange schema exhibits up to 50% message throughput improvement, under high CPU load on the server.